aboutsummaryrefslogtreecommitdiffstats
path: root/src/charon-tkm/tests
Commit message (Collapse)AuthorAgeFilesLines
* libcharon: Remove unused charon->nameTobias Brunner2014-02-121-1/+1
|
* charon-tkm: Use lib->ns instead of charon->nameTobias Brunner2014-02-121-2/+2
|
* libhydra: Remove unused hydra->daemonTobias Brunner2014-02-121-1/+1
|
* unit-tests: Pass a test suite collection name to print during test executionMartin Willi2014-01-221-1/+1
| | | | | As we except to get more and more test runners for the different components, we add a name to easily identify them on the test output.
* charon-tkm: Implement IANA DH Id to TKM Id mappingAdrian-Ken Rueegsegger2013-12-032-3/+8
| | | | | | | | | | | | | | | The TKM Diffie-Hellman plugin now maps IANA DH identifiers to TKM DH algorithm identifiers. The mapping is specified in the daemon's 'dh_mapping' section in the strongswan.conf file: dh_mapping { iana_id1 = tkm_id1 iana_id2 = tkm_id2 iana_id3 = tkm_id3 ... } Only the mapped IANA IDs are registered as supported DH groups.
* charon-tkm: Migrate tests to our own test runnerTobias Brunner2013-11-2710-126/+220
| | | | | | Due to problems with the external libraries tkm_init/deinit can't be called for each test case. Because of this leak detective has to be disabled for these tests.
* Don't manually register kernel_netlink_netReto Buerki2013-03-191-4/+0
| | | | | | | | | Load complete kernel_netlink plugin instead. Registering the TKM specific plugins first still ensures that the correct ipsec plugin is used. Lazy initialize the RNG_WEAK plugin to avoid the unsatisfiable soft dependency on startup.
* Initialize libstrongswan in test_runner main()Reto Buerki2013-03-192-54/+41
|
* Add TKM_CTX_CC (Certificate chain context id)Adrian-Ken Rueegsegger2013-03-191-1/+1
|
* Add typelen parameter to chunk_to_sequence functionAdrian-Ken Rueegsegger2013-03-191-1/+1
| | | | The parameter is used to initialize the given sequence to zero.
* Let tkm_keymat_t extend keymat_v2_tAdrian-Ken Rueegsegger2013-03-191-7/+10
|
* Add test for keymat derive_child_keys operationAdrian-Ken Rueegsegger2013-03-191-0/+89
|
* Implement TKM kernel SA database (SAD)Adrian-Ken Rueegsegger2013-03-193-0/+124
| | | | | The TKM kernel SAD (security association database) stores information about CHILD SAs.
* Add TKM_CTX_ESA (ESP SA context id)Adrian-Ken Rueegsegger2013-03-191-1/+1
|
* Use rng to generate local ESP SPIsAdrian-Ken Rueegsegger2013-03-191-0/+1
|
* charon-tkm: Register kernel_netlink_netAdrian-Ken Rueegsegger2013-03-191-0/+6
| | | | | | Explicitly register kernel netlink net implementation and avoid loading the whole kernel-netlink plugin since the kernel netlink ipsec part is unwanted.
* Add ISA context id getter to TKM keymatReto Buerki2013-03-191-0/+1
|
* Add TKM_CTX_AE (Authenticated Endpoint context)Reto Buerki2013-03-191-1/+1
|
* Add TKM_CTX_ISA (IKE SA context)Reto Buerki2013-03-191-1/+1
|
* Add keymat IKE key derivation test caseReto Buerki2013-03-193-0/+105
|
* Implement chunk_to_sequence functionReto Buerki2013-03-191-0/+18
| | | | This function converts a given chunk to a variable-length byte sequence.
* Implement sequence_to_chunk functionReto Buerki2013-03-193-0/+47
| | | | | This function converts a given TKM variable-length byte sequence to chunk.
* Add context id getter to TKM DH implementationAdrian-Ken Rueegsegger2013-03-191-0/+1
|
* Add chunk mapAdrian-Ken Rueegsegger2013-03-193-0/+60
| | | | | This data structure allows to store mappings of chunks to ids. This will be used to map nonces to their corresponding nonce context ids.
* Add context id getter to TKM nonce generatorAdrian-Ken Rueegsegger2013-03-191-0/+1
|
* Pass context limits on to id managerReto Buerki2013-03-191-8/+9
|
* id_manager: Use array of bool instead of listReto Buerki2013-03-191-0/+18
| | | | | | Instead of storing the acquired context ids in a linked list, use an array of booleans for the job. A boolean value of true in the array designates an available context id.
* Add initial TKM Diffie-Hellman implementationReto Buerki2013-03-193-0/+60
| | | | | | | | | | The tkm_diffie_hellman_t plugin acquires a DH context from the Trusted Key Manager and uses it to get a DH public value and the calculated shared secret. Proper context handling is still missing though, the plugin currently uses context ID 1. The get_shared_secret function will be removed as soon as the TKM specific keymat is ready.
* Initialize TKM client library in tkm.cReto Buerki2013-03-191-2/+8
|
* Introduce TKM specific charon daemon (charon-tkm)Reto Buerki2013-03-195-0/+285
Analogous to charon-nm the charon-tkm daemon is a specialized charon instance used in combination with the trusted key manager (TKM) written in Ada. The charon-tkm is basically a copy of the charon-nm code which will register it's own TKM specific plugins. The daemon binary is built using the gprbuild utility. This is needed because it uses the tkm-rpc Ada library and consequently the Ada runtime. gprbuild takes care of the complete binding and linker steps required to properly initialize the Ada runtime.